Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
TorDIR
http://dppmfxaacucguzpc.onion
Like Hidden Wiki, TorDIR is a list of hidden sites, and services that are available
on the Dark Web. It is a highly stable site and is well known amongst beginners.
It features a concrete collection of sites. An added feature of TorDIR is that it
has an option of adding comments.
Core.Onion
http://eqt5g4fuenphqinx.onion
The Onion Core is another comprehensive collection of sites that are available
on the Dark Web. It is a collection of links from which you can branch out. What
makes this directory special is that it does not have Child Porn and thus is very
safe. It does not have other ‘dark’ parts of the web as well.
Hash Party
http://3terbsb5mmmdyhse.onion
Hash party is a site where you can reverse other people’s hashes. You can also
request hashes. It is one of the most famous Black Hat resources available on the
Dark Web.
FBGB Cracking for Bitcoin
http://rgvawpnahbla3seq.onion
If you require a hash to be cracked however are not extremely tech savvy? This
site might help you. For a few Bitcoin, you can have any WPA/WPA2 password
broken. However, like every other site on the Dark Net, please be careful before
you use it.
TorLinks
http://torlinkbgs6aabns.onion
Another great directory of .onion links, TorLinks is far more extensive than
TorDIR. It has many more links as compared to TorDIR, so if you exhaust
TorDIR move on to TorLinks.
HackBB
http://clsvtzwzdgzkjda7.onion
HackBB is a large community board for everyone to talk about hacking and
related things. Everyone - amateurs and professionals alike, use it. You can get
into discussions and learn new things using this board. It is a safe resource to
learn about things that are not normally discussed on the surface web.
Freedom Hosting
http://xqz3u5drneuzhaeo.onion
Freedom Hosting, as the name suggests gives you space to host your sites. It is
free, and you stay anonymous. You are allowed to host anything you want on the
service, however, the content should be legal according to the US laws. Most of
the sites on the Onion network are hosted using this service.
Other than the sites mentioned above, there exist many other resources that can
be used to access the Dark Web. However, like it is impossible to teach anyone
how to use the Internet, it is also impossible to teach Dark Web as well. You
need to browse and surf to understand it and use it properly. The directories
mentioned above are great starting points that can often lead to whatever
contents you are trying to find. Just remember, be safe and careful.
Chapter 8: FAQs
Till now we have seen an in-depth account of Tor and the Dark Web. I am sure
that you must be curious about accessing the labyrinth that is the Dark Web.
However, there still might be some issues in your mind regarding Dark Web,
Tor, and Deep Web. In this chapter, let us have a look at some of the most
frequently asked questions and queries regarding the above topics.
Difference between Surface Web, Dark Web, and Deep Web
Though covered throughout the book, lets us once again revise what we have
learned so far. The terms Surface the Web, Dark Web and Deep Web can confuse
any beginner and sometimes professionals as well. However, here are the
simplest descriptions of the webs.
Surface Web
Surface web is nothing but the regular web that you and I access every day. It is
the web that we use to talk with our friends, read news, play games, shop, etc.
Basically, it is the ‘regular' Internet.
Deep Web
Deep Web is the part of the Internet. This part is almost hidden and is not
indexed by most of the major search engines. Thus, it does not turn up on your
Google/ Yahoo results. To visit the pages on deep web, you need to visit them
directly using their URLs. In simple words, deep web is everything that cannot
be seen by search engines thanks to the sheer size of the Internet.
Dark Web
The Dark web or the Dark net is a part or subsection of Deep web; however, it is
a bit different than the deep web. You can normally access deep web using your
regular tools and software; however, it is not the case with Dark web. You need
special software to access it. Dark web is notorious for the various illegal and
illicit activities that go on it. Some of these activities include trading of drugs,
gambling, illegal pornography, etc. It also allegedly it also harbors other forms of
criminal activities.
Though the Dark web is used for a variety of illegal activities, it has many
legitimate and legal uses as well. You can find the uses in the chapter above.
When was the Dark Net invented?
The Darknet was not invented per se; however, the first hidden websites started
appearing around the year 2004. Thus, 2004 is supposed to be the year when
Darknet was ‘invented.
Why was TOR formed?
The US government formed Tor for anonymous communication and to keep its
messages encrypted. Thus, the US government funded it.
Why is Tor so slow?
Before answering the question, it is necessary to acknowledge that, yes, Tor is
slow. It is also necessary to recognize that Tor will always be slow and there
exist many reasons why this is the case.
Tor cannot ever become as fast as the Surface Web because it does not work like
your regular browser. Your traffic is channeled and bounced through various
systems all over the world, and it is obvious that some network latency will
creep in. It is childish to expect a blazing fast bandwidth while using Tor.
However, it is possible to improve the overall speed of the Tor network. The
ratio of the number of users to the network is extremely low right now, and many
of these users do not comprehend that Tor cannot handle the load file sharing.
This often slows down the network. However, you can help Tor:
Configure your browser to become a relay: By making your browser a relay you
can help the network to expand that can help the overall speed and quality of the
network. You can also find sponsors for Tor to help it. With this, you can also
donate to the project. Remember, without funding Tor cannot survive.
So basically, Tor is slow because whatever you search on the network goes
through multiple channels throughout the world. This makes the whole process
anonymous. However, as the query is supposed to travel to multiple places, it is
often slow. In my opinion, this is a minuscule price for your privacy.
What is Tor?
"Tor" can be used to refer to a variety of different but related components. The
first one and the most popular one is the browser bundle. Tor, therefore, is "The
Onion Router."
In simplest terms, Tor is software that you can use on your system that can help
you anonymize your browsing habits, along with granting you access to the Dark
Web. It helps you stay anonymous by bouncing and channeling your search
queries over a large network of relays, spread throughout the world. Volunteers
run these relays, and the combined network is known as the Tor Network. What
this bouncing does is that it secures you and prevents anyone from tracking you.
This includes even the sites that you visit. It prevents the sites you visit from
learning your physical location.
Tor Browser is a modified version of Mozilla Firefox. All the privacy issues
present in Firefox are fixed in the Tor version. It is one of the most popular ways
of accessing the Dark web.
Other than the above references, Tor is also used to refer The Tor Project. The
Tor Project is a non-profit organization that runs, develops and maintains the Tor
software.
I am scared, is the Dark Net safe?
If you look at the world closely, you can observe that nothing is harmless unless
correct precautions are taken. For instance, the surface web itself is full of virus,
malware, and various other hazards but no one has stopped using it due to these.
Similarly, Darknet too is full of a variety of hazards, however, if you are not
planning to do anything illegal and dodgy, you will be safe. To take the
necessary precautions whenever you access the Dark Web, having good antivirus
software is a must.
Does Tor work with Windows 10/7/xp?
Yes, Tor works with the Windows operating system; however, I do not
recommend it. Windows operating system is full of holes and a variety of
problems, hence, even if you use Tor, some expert might be able to exploit one
of these holes and use it to access your data. You can find more information
regarding this on the Tor website.
What is the Hidden Wiki and where can I find it?
The hidden wiki is a compilation of some of the most popular pages on the Tor
network. You can link to the popular and not so popular pages on the hidden
wiki. Here is the link: kpvz7ki2v5agwt35.onion
If Dark Web is so scary/illegal, why is it still working?
That is because the Internet does not work like this. Deep Web and the Internet
are synonymous. As said earlier, the Deep Web, as said above, is nothing but a
part of the Internet; therefore ‘deleting' the Deep Web is like ‘deleting' the
Internet. With this, it is impossible to keep an eye on the Internet, as it is a vast
entity. People will always find new ways of exploiting it and therefore it is not
plausible to keep it safe.
I don’t like the sites mentioned in the Hidden Wiki, are there any
other sites that I can access, where can I find them?
Yes, the sites mentioned in the Hidden Wiki form just a tiny chunk of a variety
of sites and pages that are on the Dark Web. You can find out a variety of forums
and other groups that have lists of links arranged according to subjects. Reddit is
a good source of links as well. You can also find links from various anonymous
message boards. However, do check the source before visiting any link.
Is there Child Porn on the Dark Net? What if I accidentally see it?
Will I be arrested?
Yes, unfortunately, Dark web does have a considerable amount of Child
Pornography, and it is also possible that you may come across some while
browsing the web. However, do not worry, unless you were deliberately looking
for CP (Child Porn) you won’t be arrested. If you come across it, just close the
tab and do not visit it again.
Are there any search engines for Tor?
One of the most popular search engines on the Tor Network is TorCH. It can be
found easily, and it can help you with search queries. If you want other search
engines, you can find links to them on the Hidden Wiki.
Can I get addicted to Tor/Dark Web?
Unfortunately, yes, you can get addicted to the Dark Web. The Dark Web, like
the Surface web, can prove to be highly addictive if you know where to look.
However, unlike Surface Web, the Dark Web is not totally safe and hence it is
better to stay away from Tor if you don't want to get addicted.
What is to be avoided on Dark Net?
To be honest, it is necessary to keep your morals aside while browsing the Dark
Web. Although even if you plan on visiting only legal and ‘good’ site, it is
possible that you might stumble upon unsavory sights that might sicken or
offend you. You should expect to tumble on these sites accidentally if you decide
to use Dark Web for a long period.
I browsed Dark Web, now what to do?
It is recommended to clean your cache and browsing history after you browse
the dark web. Cleaning your temporary folder is also recommended. You can use
Ccleaner or any other similar software to clean your history, cookies and other
details at the click of one button.
Is Tor basically a proxy? Why shouldn’t I use proxy instead of
Tor?
No, Tor is not as simple as proxy. Tor is far more sophisticated way of staying
anonymous online. To understand the difference between Tor and proxies, let us
have a look at what proxies do. Proxies are provided by various providers, what
they normally do is that they set a server somewhere other than your
place/nation. Your queries, in another word, your traffic, is then related to their
server. This gives you a certain amount of anonymity. It is also a very easy to
construct and maintain architecture. All the users using this proxy go in and
come out using the same server that reduces the cost of the service provider. The
provider often charges the user for using their proxy, however, certain providers
get their monetary benefits from ads.
Proxies are quite easy to use for the user as well. You do not have to download
anything extra to use proxies. You do not have to carry anything with you to use
proxies as well. Simply direct your browser to the proxy, and you are good to go.
Proxies are good option if you do not need total anonymity and privacy and are
okay with the provider accessing your data. Yes, the provider can access and use
your data if you use proxies. The provider is aware of your identity as well as
your browser history. The provider can see all the traffic that is channeled
through their server. In many cases, these providers can trace your encrypted
traffic as well. Thus, your banking details, your e-commerce details come under
a risk if you use proxies. All of this becomes a trust game, and you have to trust
the provider with your information.
For added benefit, some providers also use SSL. This adds a level of protection
as it can keep you secure from eavesdroppers if you are using a public network.
Unfortunately, the simplicity of proxies is their bane as well. As simple proxies
only use a single server, they are extremely vulnerable. The failure of the server
can bring down the complete network effectively.
What makes Tor better than proxies is that it is not dependent on a single server.
Your traffic or queries pass through at least three different servers before they are
forwarded to the destination. Each of the above relay points is encrypted and
thus giving you a strong, multilayered protection. Thus, even if someone is
observing your connection, they cannot access your data, cannot read it or
cannot modify it either. The complete journey between your system and the
receiving system is encrypted.
Doesn’t the government back TOR? So, do they have a backdoor
in Tor?
This is one of the most prevalent myths regarding Tor. There is no backdoor
whatsoever in Tor, and no one can access your data. A backdoor would ruin the
whole experience, as it will remove a large chunk of the offered protection.
However, as Tor is software that is constantly updated it is possible that a few
bugs might jeopardize your anonymity. But thanks to a large number of users,
these bugs are found pretty soon, and a new update is released immediately. So,
if you plan to use Tor for long term, it is recommended you download the latest,
stable version whenever it is released.
Is it possible to share files using Tor? Will the process be
anonymous as well?
Yes, it is possible to use Tor to share files using Tor. However, it is not
recommended to do so as the Tor network is not designed for file sharing. File
sharing often slows down the network for everyone and causes a lot of problems.
Exit nodes are often programmed to block file sharing on the network. A tip, do
not use BitTorrent on Tor as it is not anonymous.
Can Tor be used on my cellular device?
Yes, Tor is available on Android; however, the Guardian project maintains it.
Currently, no way of using Tor on iOS exists.
How can I check if Tor is working?
The easiest way to check whether Tor is working correctly is to use a variety of
sites available online. One of the most commonly used sites is Tor Check.
I do not like Tor, how do I uninstall it?
In Windows, installing and uninstalling Tor Browser does not work with other
software. Tor Browser installs in a different way as compared to other programs.
You do not need to uninstall Tor, just delete the folder called Tor Browser, and it
will be deleted from your system completely.
Is Tor safe? Or is it malware?
It has been seen that Tor often triggers many antivirus software. However, most
of these triggers are false warnings. It is recommended to contact your software
support and report the files as false positives. However, do this only if you
downloaded Tor from a reputed source.
Does Tor provide full anonymity?
No, currently no technology exists to provide anyone with full and unbreakable
anonymity. Let us see why Tor is not (yet) fully anonymous.
It is important to understand that Tor only protects your network; it cannot
provide you full anonymity if you do not know what you are doing. It only
allows you to hide your location and identity by using layered encryption.
However, it cannot interfere with data that you intend to post. Hence, if you
decide to access Google or Facebook while using Tor, your anonymity will be
jeopardized. Your ISP will not know that you are visiting Facebook and
Facebook will not know your location, however, Facebook will obviously know
who you are if you log in. Thus, a large part of anonymity is in your control, if
you don't share your personal information, you will be safe.
Another thing that can compromise with your anonymity is the use of active
content. JavaScript, Java, Adobe Flash, QuickTime, Adobe Shockwave,
RealAudio, VBScript, Active X controls, etc. are all active contents and binary
application. What makes binary applications different than others is that they
work as your user account and have permissions to use your OS. What this
means that they can access everything that you as a user can. Adobe Flash and
Java work on the virtual machine. The virtual machine can often ignore your
configurations and thus bypass Tor as well. These applications thus can share
your data and compromise your privacy. This is why it is always advised to
disable these active components while using Tor.
The Tor Browser, which is a modified version of Mozilla Firefox, is already
configured to block all the risks that can hamper your privacy and anonymity.
All the technologies mentioned above are disabled in the Tor Browser. It also
comes with various extensions like Torbutton and NoScript thus making it an
extremely safe browser.
Is Tor a form of VPN? Should I use VPN instead of Tor?
Do not use VPN if you want to be completely anonymous. If you want to hide
the fact that you are using Tor, it is recommended to use a private server as a
bridge.
What VPN does is that it encrypts the transfer between the sender and the
provider. Thus they are a sort of proxy between the destination and the user. But
like proxies, VPNs too have a single point of failure. A sophisticated hacker can
attack the VPN to get identity information related to the VPN. VPN provider
can also be threatened to reveal the identities of the user. Thus VPNs are
subjective to outside forces that can interfere with your privacy and anonymity.
Tor is better than VPN because your IP address changes almost every 10 minutes
when you use it. It becomes almost impossible for websites to form any concrete
profile using this data. As Tor uses three-hop circuit with deep encryption, no
relay has enough information to reveal your identity or details thus making it
infinitely safer than using a VPN.
Does Tor promote criminal activity? Can criminals use Tor to
commit crimes?
Yes, criminals can use Tor to commit crimes and no, Tor does not support
criminals. Tor was not made by or made for criminals. Coming back to crime, as
said above yes, criminals can use Tor to commit crimes. However, just look
around you, criminals can use anything to commit crimes. It will be childish to
assume that criminals do not use Surface Web to organize their crimes.
Criminals have no moral obligation whatsoever; hence, instead of using Tor they
have a variety of options to conduct their crimes. For instance, they can use
stolen phone and dispose of them later. Criminals can also use malware,
spyware, etc. to control computer systems anywhere in the world. So, yes
criminals already have a lot of privacy. The aim of Tor is to provide this
anonymity to common people as well.
It is necessary to understand that everything comes with a good side and a bad
side. Tor has a bad side but so do other forms of Web. Hence, instead of shutting
down Tor or bad-mouthing it, it is necessary to take action against these illegal
activities so that Tor stays safe. Remember, the main motto of Tor is to provide
common people with anonymity.
Why some videos don’t work on Tor?
Nowadays many sites need extra plugins like Flash. These plugins operate
without the support of the browser and hence are free to conduct activities on
your computer. This can compromise your privacy. This compromise includes
disregard of proxy settings, accessing your IP address, storing cookies, etc. To
avoid this, the Tor bundle blocks Flash plugins that in turn can mess up with
video playing ability of certain sites.
Can I use Chrome/Opera/ IE etc. with Tor?
The short answer to this question is no; you should not use any third party
browser with Tor. Right now, it is not possible to use third party browsers with
Tor and get the same amount of protection as when Tor Browser is used without
any addition.
Why does my Google page come out in weird languages?
Google uses various services to give you a highly personal browsing experience.
To display results in your local language, it often uses Geolocation. Using your
location, it determines which language you probably use in your day-to-day life
and includes it in your search queries; however, as Tor uses different relays, your
IP address changes rapidly. As Google uses your IP to determine your location,
Google often shows results in languages that are different than yours. This is not
a bug of the Tor network; rather, it is a feature. It shows that the system is
working properly.
If you want to avoid this, you can use nation specific sites such as Google.au,
google.co.in etc.
Can/should I install my favorite Firefox extensions?
Tor is a Tor Browser is free software, and it is open source so you can modify it
and manipulate it however you want. As it is just a modified version of Firefox,
you can add any extension or add-on that is available for Firefox. However, I do
not recommend adding any extension to the browser as often these can
compromise your privacy. Many browsers often do fingerprinting and can also
bypass proxies.
It is not necessary to download ad-blocker extension as well. Tor provides you
with sufficient security and privacy, and it does not need any additional support.
These extensions can cause problems with some sites that can break the network
as well. Hence, it is recommended to avoid any extension or add-on. However,
you can use your extensions of your regular Firefox.
Conclusion
Thank you again for purchasing this book!
I hope that the book has solved most of your queries regarding the dark web and
has perhaps dispelled most of the myths associated with it. However, it is still
necessary to understand that the Dark Web and Tor network are dangerous places
and should be used with proper care.
Although I have mentioned many sites in the book that deal with illegal trades, it
is not my intention to promote any illicit activity. The links have only been
provided for your information, and I do not recommend using the marketplaces
to buy illegal goods.
Do follow all the instruction given in the book carefully to avoid any mishaps.
Remember, your identity is sacred; protect and cherish it.
Finally, if you enjoyed this book, then I’d like to ask you for a favor, would you
be kind enough to leave a review for this book on Amazon? It’d be greatly
appreciated!
Click here to leave a review for this book on Amazon!
Thank you and good luck!
HACKING
The Ultimate Beginners Guide to Becoming a Top-
Notch Hacker
Introduction
I want to thank you and congratulate you for downloading Hacking, The
Ultimate Beginners Guide to Becoming a Top-Notch Hacker.”
This book contains proven steps and strategies on how to enter the mysterious
world of hacking.
Many hacking tutorials and instruction guides assume you are already a high
level programmer. This book uses very plain, easy to understand language so
that you can become the hacker you aspire to be. It also provides great resources
to basic programs, systems and tutorials that will facilitate your learning process.
Thanks again for downloading this book, I hope you enjoy it!
Table of Contents
Introduction
Conclusion
Chapter 1: The basics of hacking
The Fundamentals of Hacking
Breaking into laptop or computer systems for malicious intent is what most
people think of when they think of "hackers." It will be discussed in the next
chapter however, that the malicious hacker certainly is not the only type of
hacker. Motives for hacking computer systems will range, as do the impact of
the activity.
Some cyber-hackers may be enticed by the sheer amount of sensitive and also
economic information transmitted online each and every hour, as it can be very
profitable as well. Other types of hacking may lead to exposing vulnerable
systems, and also help warm and call attention to leaks and security gaps. Some
hacking will go so far as to provide solutions and security measures. Some
hacking is just for the sheer pleasure of the deed. Regardless of the type of
hacking there are some basic facts that apply.
The bottom line is that our data is not as secure as we would like to think.
Automating Internet hacking is not just easy nowadays, but with a few “tool
checking tools” can be automated for rapid enumeration (which will be the first
step of assessing the lay of the land so to speak). This will be covered in a later
chapter.
Many systems, servers, and sites reveal information and facts that can be
obtained via the Internet and leave a doorway open for access. Even electronics,
music, and applications can be hacked.
If then compounded by the use of many systems that are automatized, the ability
to attack a multitude of systems at once, or in some orchestrated manner is made
that much easier. The scope of access and reach of the hacking is much bigger
than decades past.
Any hacker with decent experience will tell you that very first requirement of
hacking is to understand computer programming and language. Languages and
codes make up everything that you see. This includes everything such as
operating systems with a graphical interface, with icons, menus and tools that are
easy to see, point and click on, to command line interfaces that require any one
of hundreds of prompts (or commands). To become a hacker it is highly
recommended and virtually necessary that you have some key programs under
your belt.
The Impacts of Hacking
Depending on the type of attack and target the impact may differ greatly. On one
end of the spectrum, the hacker may just explore a system or network for the
sake of learning or out of boredom. On the other end, resources, websites,
sensitive information, financial information, and high level defense and space
programs are some of the areas that malicious hackers may expose. The
financial, personal and business and security effects can be devastating.
So, what type of hacker do you personally ascribe to be? If you are not sure, then
read on. Not all hackers are alike, but there are a few main categories that you
may fit into.
How to Think, Believe and Act like One
Hackers are creative problem solvers. They are also somewhat patriotic in nature
in that they believe in freedom and in some way, mutually assisting people and
sometimes institutions (no matter the intent). Hackers generally defy authority,
censorship and secrecy, and demand transparency of information. They want to
expose truths and shed light on closeted information.
To become known as a hacker, you will need to begin to walk the walk, and talk
the talk. This belief system is one you have to learn to adopt. If you are okay
with the status quo, and think you shouldn't be tinkering with information unless
invited, well, this just is not for you.
Hackers and many developers of code and software for hacking are almost
always volunteers (with some exception to those paid by corporations per se, to
tease out vulnerabilities).
They are also dedicated and do much of the behind the scenes work not just for
themselves but for other hackers to learn by and to utilize. For example, they
will maintain newsgroups and mailing lists, archive Internet sites, etc. Hackers’
contributions made the Internet, the Unix Operating System and much more,
what it is today.
Hackers, not Crackers
Amongst true hackers, there are three distinct categories, and with very different
agendas. The titles below can also be used as adjectives, such as describing an
action as being white hat, or an attack is black hat.
1. White Hats
White-hats are the more “ethical” and legal of hackers. They may be hired to
hack a system or even awarded as a contest, so that a company can test the
vulnerabilities and areas of weakness, which is called penetration testing, (this
will be covered later), for the intent of making them more secure. They may also
access computers by asking permission. They will work with the company or
person that hired them for this specific purpose.
2. Black Hats
Black-hat hackers, a.k.a. “black hats,” notoriously access systems with bad
intent, such as stealing personal information, credit cards, etc. They also will
bombard websites with DDoS attacks, and completely shut sites down. Black
hats will also retrieve vulnerability information and sell it to others. They are
also the stereotypical, bad, cybercriminal.
3. Gray Hats
Gray-hat hackers are somewhere between the White and Black Hats. They also
can commit criminal activities. The gray-hat hacker may inform someone after a
hack of what they found when they (illegally) accessed the system.
They may also tell the world about their exploits, which is bad for the company
(or other) as well as leaves the expose open to black-hat attacks. The intent may
have been to help by penetration testing, but permission was never asked and the
end result may not be so nice.
Infamous hackers
• There are extensive lists, books and blogs that detail the
exploits of famous hackers, the most renowned of whom have
also had some serious run-ins with the legal system. Just
remember that not all hackers have malicious intent, but of
course, the bad ones get all the attention!
There are numerous hackers that are virtually famous within the hacker
communities, respected for their wisdom, knowledge, problem solving skills and
codes. Some run solo, some are affiliated with larger groups.
Hacktivism
The now infamous group, Anonymous is one of these groups that define
themselves as being hacktivists. They are best known by either speaking publicly
but only when wearing the Guy Fawkes mask, or the "man with no the head"
image. They are an international network that sprung from an online board
named “4chan.” They used “Anonymous" as their moniker to reflect the
anonymity of their postings. They have no leader but share the same goals,
which are hacking and activism.
They, for example, will target a terrorist organization by interfering with their
propaganda that is used to invoke fear on a constant basis. Their hacktivist
strategies have included taking down their websites, and blocking their social
media accounts. In this way, hacking is viewed in a different light and may not
fit into a “hat” category.
Government, some churches and large corporations whom have been affected by
their hacking or their public exposes may disagree, but many more persons find
that their controversial techniques are used for revealing and abating some
severe social issues in a very bold way. They will publish online, and create
videos for the world to see, shedding light and shaming some of the worst
offenders in their view and in the public’s eyes. They could be considered
somewhat of a Robin Hood of the hacker community.
Chapter 3: How to get started as a hacker
One cannot just jump right in to be a great hacker. It takes a lot of education and
work. Reading as many Books (like this!), blogs, tech forums, and talking with
people at any type of tech meeting or class will add to your body of hacker
knowledge. You may find someone to help you, but as many hackers are self-
taught, some may not be as patient and/or may see any pleas for help as “lazy”
and not worthy of being mentored. A good hacker should show strong
motivation.
Any hacker with decent experience will tell you that very first requirement of
hacking is to understand computer programming and language. Languages and
codes make up everything that you see, whether there be a graphical interface,
with icons, menus and tools that are easy to see, point and click on, to command
line interfaces that require any one of hundreds of prompts (or commands).
To become a hacker it is highly recommended and quite necessary that you have
some key programs under your belt. Familiarity with a Unix based Operating
system, such as OpenBSD, FreeBSD, NetBSD, and any distro (distribution or
version) of Linux is highly recommended as well. A knowledge of how to use
commands at the prompts is essential. Programming languages such as Batch,
C++, Python and Perl are also good to know.
Visual Basics is not recommended by most hackers. Some will even go so far as
to mock those what want to use a Microsoft program since it locks you in to
proprietary programs that are not portable, and stifle your creativity and abilities.
Web development and creation programs such as CSS3, HTML5, JavaScript,
mySQL, and PHP are also very good to know as well as Basic.
Programming skills are critical. Once you have some programming language
under your belt (assuming you do, or are in process), you should try to create an
app, a site, or game, etc. You also can read hardcopy books, take live classes, use
sites with tutorials, and visit YouTube. Once you know how to program
something, you can also break it. You are also able to fix it. The information
behind these technologies is something invaluable to see and learn.
Computer systems are connected by networks that you also must understand. If
you know what an IP address, OSI, port, protocol, router, etc. are and know how
to work with them, great! If not, again, it is recommended to school yourself.
You should get to the place where you can set up your own network at home,
and with a few computers. It would be an invaluable lesson to mix up the types
of operating systems in your network, or at the very least try Linux!
The familiarity and use of other operating systems (OS) is necessary. Especially
if you are just used to Windows or a Mac, it is important to start learning another
operating system now. It is recommended to try a form of Linux distro (a
distribution, or version) of Linux. Over and over in this book, and in any hacking
materials, you will see reference to commands, prompts and command line
interfaces. If you don’t know what these are you need to learn in order to do any
significant hacking work.
Linux Ubuntu (one of the distros) is a good version to download. You can
download it right to a CD or USB, and choose the desktop version to test it out.
It doesn’t take up much space this way and you won’t make any alterations to
your system.
You can choose the graphical user interface for the desktop, have what looks
somewhat like Windows (with icons, menus, etc.), and get a test drive of
commands through the prompt. Read up on Linux systems to get more
information to get you started. You can also gather all of the commands and
syntax so that you can navigate the Linux waters.
Here are some quick links to check out, to help with a few of the key skills that a
good Hacker needs:
Hacking systems and larger networks can be a very involved process. This is
where the programming language, programs and operating systems, and apps
will come into play. However, we can provide a context for what is happening,
and outline some basic steps of what a network hack would look like. There will
be more about the specific steps and a description what the roles are in the
hacking process is in the following Chapter.
You would first start by assessing a vulnerable operating system. Once you
select your organization or a system to hack, there is a popular hacker program
called Metasploit Framework to help begin the hacking process. Metasploit
Framework is actually a powerful penetration testing tool that checks for
vulnerable systems.
Metasploit also has a huge database of exploits that you can use. It is open
source, and allows for the use and development of any codes within. More about
Metasploit will be in a later chapter that also discusses penetration testing more
in-depth.
To note, a white hat hacker would use something such as this to test and serve a
helpful purpose, but a black hat might carry out an attack with an exploit code
with Metasploit’s help.
Now let us walk through what this hack might look like if done from within a
network, so there is no need to fear a firewall or other measures that work to
block things from the outside world. (These things would take more
circumventing and experience, so we will go for the low-hanging fruit).
First you would select an Exploit, your special hacker instruction code, found
with the penetration testing that you have done. Then you would locate one
system on the network that is vulnerable to attack in order to take hold of the
entire network.
Next, with your exploit decided, you will send it to someone you have identified
on that one system via a PDF or a link possibly. When the other person clicks
and opens the link, a “meterpreter” prompt appears and the networks on both
sides.
This is your gateway access for the other system. The payload is deposited and
unpacks itself, with all of the malicious programming bits and pieces. This is
where the automated work begins.
A Metasploit module then will allow you to uncover all other internal systems on
the network. You will then route traffic from the gateway to the hacked system,
and now, access to any of the other identified systems on the network. All of the
systems are now able to be hacked through the one gateway that was set up,
using any one of the exploits that were chosen with the testing.
This is one type of hack that anyone in a workplace knows well. It is the
nightmare of IT Departments across the world. That exploit could be something
simple as a silly program that repeats its messaging, to a virus causing
irreparable damage. You can always use an online tutorial at any point if you get
lost, with this serving merely as an example of where you may need some
instruction to guide you to the next step.
Chapter 5: How to Gather Data and Analyze Targets
In the last chapter we addressed the “how to hack” in a preliminary way. In this
chapter we are going to walk through, how to gather information that is needed
prior to the “hack,” in a bit more detail. Some important legwork needs to be
done, regarding the individual or organization that is going to be hacked. After
the target has been identified, their data then has to be examined, or analyzed.
Specific vulnerabilities will be sought to determine the “exploit” methods and
targets.
All of the data and information collected will need to be triangulated, or brought
together, to look at the whole picture. Then, more specific information can be
teased out. Some of these steps and terms are below. It should also be noted that
although these are some of the fundamental steps, the tools for hacking are
evolving quickly and may change with time.
It should be noted that some of these data gathering strategies are active and
some are passive. For example, Netcraft is a website that also will help in your
data gathering. It passively helps you to search for exploits, such as what
operating system a company may be using. This type of information is listed on
this public site. There is no risk and not much work involved. Other methods
may require a more active approach, and these may garner deeper information in
many cases but they may also carry a risk of being detected.
Footprinting
Teleport Pro for Windows is an internet webspider that can help expedite and
deepen your web searches.
Maltego is another great open source program, for which there is an edition in
Kali Linux. Maltego can be used for forensic information on networks, or
individuals, and connects their known and unknown relationships for you. It
saves time and frustration.
Enumeration
This is a step that may reveal weaknesses in the systems with networks. This
step may also result in a few types of queries (i.e., areas of further investigation).
Again, this step also highlights vulnerabilities.
Deeper queries can also be made to search any servers, contacts for
administration, and who has responsibility for the security. You can also obtain
information on firewalls and how the system is configured.
Scans can be done of the ports, which also can uncover the operating system
type and applications. Services that are enabled can also be detected. Older
versions of programs can leave a system wide open. User accounts can also be
retrieved.
Once most of the vulnerabilities are identified, the attacker can move into the
last stage of their attack, which is exploiting the computers. This also can be
automated and with a botnet, many systems can be affected at once.
If you are a white hat, you will find these types of information valuable for your
own purposes, and of your potential client/company. Some of these gaps will be
revealed, and solutions can be created. For a black hat, these types of
information are a first step to a mischievous deed. In this light, if you are on the
opposite side, and work in security, this information is also valuable.
As you can see, there are many ways to circumvent being detected when testing
a system. Additionally, there is much information on the Internet that can be
used for a hacker to start the assessment process and look for vulnerabilities.
This should also be a lesson to those who think nothing of listing everything,
everyone, and every number on websites.
Chapter 6: Hacking Tools and Techniques
There are a lot of free programs, and many open source programs at that, to help
you along your hacking lessons. We will mention some along the way, as we
look at some hacking techniques you may want to try out. Actual code is not
provided here as you will need to read, study and practice with some of the
programs and systems, and to learn commands before embarking upon these
hacks.
Once you have at least the programs, and a list of codes and know how to use
them, feel free to try them out! Also, keep this book around for the time when
you are ready to go further. It will provide some simple exercises and ideas on
which to build your skills and confidence.
Accessing documents
In order to snatch a document you know exists off a remote system, first we will
need to access the other server. Using a program called Maltego we can create a
list of email addresses. Meanwhile, the Metasploit Framework can be used to
generate the exploit code which will be sent to the server. A link with the code
can be sent to the entire list. All it takes is one click and the meterpreter is
launched on that system. You can then pivot and get information such as IP
addresses for each system. With a scan, every system on the network can be
found. Within each system a search can be done for the document we know is
there. Once found, we can simply download it. Using the directory in your
operating system (which hopefully is a Linux distro at this point!), you can
search to find the document in your system.
Spying
We will now attempt to attack a computer, using Kali Linux to conduct a spy
mission.
You may need a “multi-handler” to connect back to your system. This is can be
set through your Metasploit. You will also have to set your IP address.
When you send the file and the person has taken the “bait,” you will gain control
over their system by way of the meterpreter. With a prompt you will go into the
microphone and turn it on. From the meterpreter you can also record
conversations and store them in your system.
Hacking with a Webcam
There are also a few ways to hack webcams. This is one extremely easy one that
does not require any knowledge of programming language. First install
Universal Webcam Hacker Pro with IP Hacker. With this you can connect and
disconnect, start the camera, and use a microphone. You simply follow the fields
and enter information. You need the webcam’s IP address but with Google and a
good program, this shouldn’t be hard to find.
Hacking a SmartPhone
Again, we have many options for hacking someone’s cell phone, either remotely
and with the actual phone. With WiFi, two phones, and the soon-to-be-hacked
phone. If the phone is on but asleep, a simple text message (SMS) can be sent to
work with Internet Explorer.
A strategy using a fake website, (similar to the prior hack for a website), is to
send an app by way of tricking the user to click on a website. Another version
called Clickjacking also sends a website, but the user does not know they are
installing an app from the Google Play, which will insert malicious code.
Social Engineering Strategies
Since we mentioned social engineering, you should know about a program called
Social Engineering Tool, or SET. This program automates, through a set list of
possible attacks that are most probable that a human will fall for, and open. You
have most definitely heard of many if not most of these strategies. You may not
have known there were applications and files behind them! As you will see
below, there are many ways to play on human behavior with any of these
methods.
One of the largest problem areas of exploitation is from the spear-phishing (the
first choice that you see on the list when you launch the Social Engineering Tool
program). This accounts for about 90% of data security breaches. This involves
sending some form of electronic to a specific target (person or a business).
Through these types of phishing activities, hackers can easily send malicious
exploits through carefully designed messaging that appeals to a particular
target’s line of business or personal interest. Some are in the form of warning,
notices, shocking news, or a routine message with an insidious surprise.
They come in the forms of Documents and emails, faxes, fake log-ins for social
media, QR codes, SMS messages, and links. Some of these phishing tactics are
simple and some are quite sophisticated. They can also be done in one or more
stages.
“Whaling attacks” is a term to describe phishing attacks but for those targets
with a larger scope of influence and information in a business. These usually
yield a much bigger catch for the hacker.
Hacking Websites
A program we will use for a website attack is a simple download called Low-
Orbit Ion Canon (LOIC), and it is free. Web designers use it to stress test sites.
After downloading and launching, you will merely type in the in the URL of the
target website, and soon, a possible 200 requests a second will flood the site.
You can even partner with others. This is known as a distributed denial of
service, or DDoS attack), to take down the site. Many websites cannot handle
this. This is a very popular way to take a site down, fairly quickly.
Again, there are many ways to scan for information, access a site, and do some
work with it. Research some that you are comfortable with, based on their
complexity and the programming language. You will also want to look at the
other software and programs that you will need and decide if you want to
download any that are required for the work. At the very least this will be an
exercise.
There is actually a website you can practice on called Hack This Site found at
www.hackthissite.org. You don’t have to be a professional yet, and you will
learn by doing. In addition to many learning opportunities, there are blogs,
release notes, and also other hackers in the forums that you can talk to on the
site.
Using Known Exploits
Getting a hold of a list and names of known exploits will provide much
information for you to attack your target. When hackers find vulnerability,
companies (even large ones such as Microsoft!) will make announcements to
warn of these.
Unfortunately for the public, but to the pleasure of hackers, these corporate
notices also give the name of the exploits. A simple web search provides hackers
the exploit codes and more.
Cracking passwords is very different from hacking. Even a hacker makes this
distinction. (We have not even addressed phracking either, which involves
hacking a telephone!). If data is also encrypted it may be harder to do this,
however, most single user data is under the password protection alone. Cracking
is definitely a criminal activity unless someone grants permission.
Windows
This is one of the easiest operating systems on which to crack the passwords.
The same program can also be used on a Mac operating system, as well as
Linux. By doing a Windows repair, with a disc and commands, you can easily
crack the system. Ophcrack, and it is free program based on Slackware, the
oldest distro of Linux.
Linux
Linux is easier than with a Mac. When you turn on the computer, hit the ESC
key when GRUB pops up. Choose “Recovery Mode” along with B to enter as a
single user. Then enter the code “passwd” and then set the password. This gives
access for the whole system. Type ‘”username” insert the login name for a sole
account.
Other ways to crack on a Mac
The installation CD can be used as with Windows but you need to select “Reset
password” in Utilities when it reboots. For some versions of Mac you have to
use commands (these can be researched online when you are ready to use the
code).
Cracking Social Media
For persons you do not know, you can create a mirror website and redirect the
person to the site when they attempt to login to their real account. One software
program is accessible (free!) through Kali. It is HTTrack. You can also use the
Social Engineering Tool (SET)’s malicious Java Applet Attack, one of the
Website Attack options, to clone and customize your website.
Keyloggers can be installed on someone’s computer that you have actual live
access to do the installation. It is a free program. You can access a copy through
CNET or other legit sites. They record keystrokes as the person types their
password (and more!).
Passwords for Wireless Routers and Websites
Hackers can change your default router settings, ports and firewall settings so
that they can come and go as they please, usually to secretly route traffic for
their own purposes.
First we need to go to the THC Hydra website, download Hydra which is a free,
Linux-based, “brute-force” tool. Interestingly, Hydra was created for penetration
testing but is also used for cracking passwords.
Hydra is great for hacking routers, especially supporting SSH, as well as any
Web servers using FTP. When hacking a wireless router, you can go in, change
administrative settings and hack the network for complete access to its resources.
You would use Hydra, along with Arch Linux. With some simple information
such as the target’s IP address you can locate a port and work on cracking a
password to attack the router.
If you use Hydra to crack an FTP password you can access websites, and
through the server, change HTML and images.
Chapter 8: Penetration Testing
Often the penetration testing goes undetected, but in some cases it does not! If
you are a Pentester who is a white hat and have permission to do the pentest on
behalf of someone else, this will not matter (since you are also testing security).
If you are a black hat then it matters a lot. In either case, it is a necessary step to
find vulnerabilities and security gaps in a system or network.
Interestingly, as there are hats within the hacker culture, there are Teams within
the Pentesters. There is what is called a Red Team (a term which actually began
in the military). There is also a Blue Team (which is the defensive one). This is
quite interesting in origin since the penetration test really is a simulated attack!
On another note, security testers and researchers may use some of this data if it
is allowable or legal to report. In some cases it may or may not be even legal to
do the work. Depending on the hacker, however, a full penetration testing report
just may be publicized on the web to expose vulnerabilities and teach other
hackers how to exploit systems with payloads.
As mentioned earlier, the open source Metasploit Framework is one tool that
tests for vulnerability within computer systems. It can also be used to develop
and execute exploits (codes) for remote systems. It has built in tools to help
avoid detection in some cases as well. It is well used in the larger the hacker
community. Essentially you can test and/or hack systems with this program.
NeXpose is a project of Metasploit, which also helps a Pentester to scan for
vulnerabilities.
BackTrack is another tool and a fairly easy one to do penetration testing. You
may find this is also mentioned in hacker writings. It is not being maintained at
time of this writing however, and the Kali Linux distro is recommended. It is
also known for its wide capabilities and large directories of applications that help
with testing and exploits.
The exploit, a term that has been discussed many times before now, is a very
specialized program that is intended to gain access to a system. It carries what is
called a payload, which is essentially a small package of code that runs in the
system where it is delivered. Metasploit contains an enormous database of
existing and already tested exploits
This chapter will cover some tips and some reminders from what you have
learned, as well as a brief list of resources for further reading.
Tips and Reminders:
• It cannot be repeated enough that you must understand,
or quickly start to learn, the workings of a computer. Learn
how systems work. Learn how smartphones work. They rely on
code.
• Walk the walk, talk the talk, and think like a hacker,
learn from other hackers but also do not get caught. Just be
mindful when coming into your new hacker status.
Important to note that on the site it states the following: “Hack This Site is a
free, safe and legal training ground for hackers to test and expand their hacking
skills. More than just another hacker wargames site, we are a living, breathing
community with many active projects in development, with a vast selection of
hacking articles and a huge forum where users can discuss hacking, network
security, and just about everything.”
There are a variety of missions you can take as assignments, and they are not just
for websites. You will see app hacking, phracking, and forensics just to name a
few. Check it out!
Conclusion
I hope this book was able to help you to provide you with some basics to
consider when you want to learn how to hack.
The next step is to start to learn your programming language and test-drive some
of these methods. Like a scavenger hunt, you will need to search for the hidden
gems of knowledge that you will need for your journey. Rest assured, everything
you need to know is available at your fingertips.
Finally, if you enjoyed this book, then I’d like to ask you for a favor, would you
be kind enough to leave a review for this book on Amazon? It’d be greatly
appreciated!
How would you feel if you were working at the forefront of emerging
technologies that could potentially change the world, and revolutionize the way
we think of processing and automation? Imagine the job you would have if you
were among the top professionals in this world that understood how to develop
algorithms that could teach machines to learn on Discover Python and Why It’s
the Future of Programming in Only 24 hours
How would you feel if you were working at the forefront of emerging
technologies that could potentially change the world, and revolutionize the way
we think of processing and automation? Imagine the job you would have if you
were among the top professionals in this world that understood how to develop
algorithms that could teach machines to learn on their own.
Bestselling author, Bruce Rogers, presents another excellent guide on the python
programming language for beginners, and the remarkable findings of his study
on its applications in technologies today that’s changing the world of tomorrow.
http://amzn.to/2kNwKQx